Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence